The report is devoted to the problem of applying fuzzy set theory and fuzzy logic methods in mode... more The report is devoted to the problem of applying fuzzy set theory and fuzzy logic methods in models of diagnostics and assessment of the technical condition of TPP equipment using artificial intelligence methods. Are given here: description of fuzzy images; formation of features of fuzzy images; development of criteria for evaluating features; definition of dividing rules for fuzzy images; classification of fuzzy states of the power plant. The simulation algorithm is considered in relation to a heat and power unit with fuzzy input information and a statistical assessment of the adequacy of fuzzy models. The accuracy of the obtained mathematical model is estimated based on the estimation of the degree of dispersion of the obtained regression line relative to its mathematical model, while the adequacy criteria of 2 types (“R” and “D”) are introduced, which help to integrally assess the proximity of mathematical models to the object under study using the selected measure.
Today all higher educational institutions use Internet marketing technologies to attract applican... more Today all higher educational institutions use Internet marketing technologies to attract applicants. Websites serve as a starting point of this work. They become particularly topical in the context of the «Export of education» project aimed at the attraction of foreign applicants to national higher educational institutions. The study analyzes foreign versions of the websites of Russian higher educational institutions by several parameters: technical parameters, content structure, user friendliness and user behavior on the website. 34 websites formed the sample. The analysis of user behavior at the website made it possible to estimate its efficiency. Following the results of the study it was found that foreign versions of the websites of Russian higher educational institutions need to be optimized with respect to several indicators. Recommendations were given to improve the websites regarding each parameter.
We analyze a problem of formalization a non-repeated decision-making in entrepreneurship when the... more We analyze a problem of formalization a non-repeated decision-making in entrepreneurship when there are exist alternatives with negative outcomes, or losses, one among which does not have dangerous consequences. We consider a problem of modelling the subset of alternatives as variants of risks combinations, in particular, the choice of an optimal variant of the alternative. The proposed model may be exploited for formal justification of the alternative choice during the early stages of non-repeated.
2008 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, 2008
A 48-round block cipher CAST-256 was a participant of the AES competition. There are two publishe... more A 48-round block cipher CAST-256 was a participant of the AES competition. There are two published attacks on this cipher. The first allows to break the cipher, consisted of 16 rounds. Another can break 36 rounds but only for some weak keys, in particulary, a 24-round version of CAST-256 can be broken for a 2-30 part of all possible keys.
The report is devoted to the problem of applying fuzzy set theory and fuzzy logic methods in mode... more The report is devoted to the problem of applying fuzzy set theory and fuzzy logic methods in models of diagnostics and assessment of the technical condition of TPP equipment using artificial intelligence methods. Are given here: description of fuzzy images; formation of features of fuzzy images; development of criteria for evaluating features; definition of dividing rules for fuzzy images; classification of fuzzy states of the power plant. The simulation algorithm is considered in relation to a heat and power unit with fuzzy input information and a statistical assessment of the adequacy of fuzzy models. The accuracy of the obtained mathematical model is estimated based on the estimation of the degree of dispersion of the obtained regression line relative to its mathematical model, while the adequacy criteria of 2 types (“R” and “D”) are introduced, which help to integrally assess the proximity of mathematical models to the object under study using the selected measure.
Today all higher educational institutions use Internet marketing technologies to attract applican... more Today all higher educational institutions use Internet marketing technologies to attract applicants. Websites serve as a starting point of this work. They become particularly topical in the context of the «Export of education» project aimed at the attraction of foreign applicants to national higher educational institutions. The study analyzes foreign versions of the websites of Russian higher educational institutions by several parameters: technical parameters, content structure, user friendliness and user behavior on the website. 34 websites formed the sample. The analysis of user behavior at the website made it possible to estimate its efficiency. Following the results of the study it was found that foreign versions of the websites of Russian higher educational institutions need to be optimized with respect to several indicators. Recommendations were given to improve the websites regarding each parameter.
We analyze a problem of formalization a non-repeated decision-making in entrepreneurship when the... more We analyze a problem of formalization a non-repeated decision-making in entrepreneurship when there are exist alternatives with negative outcomes, or losses, one among which does not have dangerous consequences. We consider a problem of modelling the subset of alternatives as variants of risks combinations, in particular, the choice of an optimal variant of the alternative. The proposed model may be exploited for formal justification of the alternative choice during the early stages of non-repeated.
2008 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, 2008
A 48-round block cipher CAST-256 was a participant of the AES competition. There are two publishe... more A 48-round block cipher CAST-256 was a participant of the AES competition. There are two published attacks on this cipher. The first allows to break the cipher, consisted of 16 rounds. Another can break 36 rounds but only for some weak keys, in particulary, a 24-round version of CAST-256 can be broken for a 2-30 part of all possible keys.
Uploads
Papers by A. Pestunov